Matching
Match each item with a statement below.
Premises:
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
A method of gaining access to the underlying host through flaws in the hypervisor.
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
Used to determine the MAC address associated with an IP address within the sender's network.
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
A common open source protocol used to communicate between switches and a management server.
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
Responses:
distributed switch
software-defined network (SDN)
Address Resolution Protocol (ARP)
directory traversal attacks
VLAN
scanning phase
OpenFlow
internal virtual switch
Non-Uniform Memory Access (NUMA)
reconnaissance phase
Correct Answer:
Premises:
Responses:
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
A method of gaining access to the underlying host through flaws in the hypervisor.
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
Used to determine the MAC address associated with an IP address within the sender's network.
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
A common open source protocol used to communicate between switches and a management server.
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
Premises:
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
A method of gaining access to the underlying host through flaws in the hypervisor.
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
Used to determine the MAC address associated with an IP address within the sender's network.
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
A common open source protocol used to communicate between switches and a management server.
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
Responses:
Related Questions
Q16: You have just turned on a virtual
Q17: What statement regarding the use of IPv4
Q18: What statement reflects a valid approach to
Q19: Both vSphere 6.0 and Hyper-V provide checkpoint
Q20: What private IP address range is a
Q22: What phase of an attack implies a
Q23: The process of storing a single copy
Q24: What is a trunk port, and why
Q25: You are attempting to move a vSphere
Q26: What VMware vSphere technology allows you to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents